Sciweavers

5665 search results - page 56 / 1133
» Introduction to Computer Security
Sort
View
COMPSEC
2006
143views more  COMPSEC 2006»
13 years 9 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
PDCAT
2005
Springer
14 years 2 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
MOC
2010
13 years 3 months ago
Computing matrix representations
Let G be a ...nite group and be a faithful irreducible character for G. Earlier papers by the ...rst author describe techniques for computing a matrix representation for G which a
Vahid Dabbaghian, John D. Dixon
AISM
2004
13 years 10 months ago
Computer Security Research: Approaches and Assumptions
Researchers, no matter their field, are faced with the problem of selecting an appropriate approach before conducting a study. The purpose of this paper is to provide an overview ...
Christopher Bolan, Daniel Mende
CCS
2010
ACM
13 years 9 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...